Exam 14: Workshop 14: Implement Your Database

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Preventing a table from being opened directly requires hiding the ________.

(Short Answer)
4.9/5
(37)

Suggestions are actions that Access believes will improve your database performance but may have consequences that should be considered first.

(True/False)
4.7/5
(36)

After you run the ________,it provides three types of analysis results.

(Short Answer)
4.8/5
(29)

Information is ________ using a key.In Access,the key will be a password.In other applications,the key can be a separate file.

(Multiple Choice)
4.8/5
(39)

In ________ implementations,small groups of a company start using the new database.Gradually,more groups come on board as the system is perfected,until the entire organization is using the new system.

(Short Answer)
4.9/5
(32)

The keyboard shortcut of ________ shows or hides the Navigation Pane

(Multiple Choice)
4.9/5
(30)

Which of the following is NOT true regarding linked tables and the Linked Table Manager?

(Multiple Choice)
4.9/5
(39)

To ensure the ________ of the database,access to several features must be eliminated.

(Multiple Choice)
4.9/5
(39)

Special keys are a set of four keyboard shortcuts that can be disabled when securing a database.

(True/False)
4.7/5
(30)

The back-end database is deployed directly to users and contains nondata objects such as queries,reports,forms,macros,and VBA modules.

(True/False)
4.8/5
(40)

The back-end database can be stored in a(n)________ where a company's technical support can ensure the data are protected and backed up regularly.

(Short Answer)
4.8/5
(34)

The Performance Analyzer can only review individual Access objects.

(True/False)
4.9/5
(32)

The ________ implementation approach involves implementing your database in its entirety and replacing the legacy system all at once.

(Short Answer)
4.8/5
(35)

When establishing security in a database for implementation,Access routinely requires opening the file in Exclusive Access mode.

(True/False)
4.8/5
(34)

To properly secure a database,special keys should be disabled,because special keys allow users access to the Navigation Pane and the Visual Basic Editor even if these items are hidden from view initially in the database.

(True/False)
4.8/5
(41)

Which of the following common features of Access 2013 is NOT compatible with Access 2003?

(Multiple Choice)
4.8/5
(31)

The ________ of a database creates a front-end and back-end system.

(Multiple Choice)
4.9/5
(22)

Ultimately,to protect a database and its information,passwords and decryption can be implemented.

(True/False)
4.9/5
(32)

The ________ is deployed directly to users and contains nondata objects such as queries,reports,forms,macros,and VBA modules.

(Multiple Choice)
4.8/5
(39)

In a ________ implementation,the legacy system and new system are used concurrently.

(Multiple Choice)
4.9/5
(38)
Showing 21 - 40 of 98
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)